NEW Online Photo Sharing Service that is Drag and Drop Easy

November 29, 2010

There are numerous ways to post and share photos (or pictures) on the internet; however, the processes  to share your photos can be quite confusing.

If you are looking for an online service that makes photo sharing fast, fun and easy, then take a look at Minus.

Minus

Minus is a drag-and-drop sharing system. When you first visit the Minus home page don’t let first appearances deceive you.  The real power and magic occurs when you put Minus to work. Simply drag your photos (docs, music, videos and other files coming soon!) onto the Minus home page and the photos will be automatically uploaded and posted in a gallery. Following the upload process you will be provided with web links to each individual photo and for the entire gallery. Once you have the web links you can then send the links to others that will allow them to view the pictures. Currently you are permitted to upload photos (PEG, GIF, PNG, APNG, BMP) that are up to 7 MBs in size, and you can upload 50 photos per gallery. People viewing the photos have option to download individual photos or the entire gallery.

An online account is not necessary; however, I do recommend signing up.  By signing up you can then access, monitor and manage any of the photo galleries that you have created. Keep in mind, Minus is still in development stage and will most certainly only get better. I can foresee Minus being a very popular online picture (and file) sharing service.

Features:

  • Drag picture(s) from your desktop and folders onto Minus and a new gallery will be automatically created.
  • Use the Left Arrow ← and Right Arrow → to browse the gallery or simply navigate with your mouse.
  • Save & Manage your gallery with the Editor Link.
  • Name your gallery by clicking on top right “Untitled” button.
  • Change the order of image displays in gallery by dragging image titles on top right up and down.
  • Add more photos into gallery by dragging photos onto gallery page.
  • Delete photos from the gallery by clicking the X icons.
  • Delete the entire gallery by clicking the Trash icon.
  • Share the gallery with your friends using the Viewer Link.
  • Share a single image with your friends using the Direct Image Link.
  • Click on Download gallery link in gallery menu to download entire gallery images in Zip file.
  • Click on My Galleries button at bottom right of your screen to see history of your created and viewed galleries.
  • Click on Register / Login button at bottom right of your screen to create a new account or login.
  • Share Anonymously or Logged In.
  • When sharing anonymously , your galleries are tracked via a cookie that is attached to one computer.
  • When sharing while logged in, your galleries are tracked permanently until you clear the gallery history.
  • My Galleries tracking between anonymous and logged in state are separate.
  • If you wish to import galleries, simply re-open the editor or viewer urls for the galleries while logged in.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Bookmarks to the Best on the Internet Already Created for YOU!

November 29, 2010

Over a period of time we collect numerous bookmarks to our favorite sites to the point it becomes unmanageable, unforgettable and actually very inefficient.

Recently I featured a blog post about a web service called Kadaza.

Kadaza

Kadaza is a visual directory only showing the absolute best and most popular websites in many different categories.

Following that post I have been using the living daylights out of Kadaza.  Why? In today’s internet world we should only be bookmarking sites that are specific to our current specific interests and needs. Otherwise, collecting and managing bookmarks to commonly known sites in my opinion is mundane. Kadaza takes care of the mundane part.

Following the Kadaza post, I found a nice segment to their site that lists all of the Kadaza categories in alphabetical order. In each category only the best, most popular and reliable sites on a specific topic are listed. For example, you can click on “S” for “Shopping” or “E” for “Electronic Stores”, etc…

If you are looking for the ultimate bookmarking list, then this one is it.

You can get to the Kadaza bookmarked categories [HERE].

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Holiday Season Alert: Fraud – Don’t Become A Participant

November 28, 2010

With the holidays upon us the cybercriminal will prey. As a result, I felt compelled to resurface a past article that I had written that will help protect you from the cybercriminal and online fraud.

FRAUD – deceiving another in order to damage them (for personal gain).  Fraud is a crime of deception where you decide to be a participant or not.  Online fraud comes in many flavors; from deceiving emails to deceiving software.

Are you a participant?

In order for fraud to take place, the perpetrator must attract the participation of the victim.  This is usually done through trickery; ultimately for financial gain.  Computers and the internet have made it very easy for fraud to take place.  It is not limited to just our national borders, but is an international (worldwide) problem of great magnitude. You never see the perpetrator in cyberspace. They are invisible to us, and as a result, recouping your identity or any financial losses can be next to impossible.

Several examples:

  1. To provide a powerful example of how fraud can lead to identity theft, I encourage you to preview this video clip, “An Interview With An ID Thief”,  at Tech-for everyone [click here].
  2. One of the most common fraudulent methods out there right now are the rogue security applications that trick you into buying security software.  As an example, see this article [click here] ,composed by Bill Mullins-Tech Thoughts, on a rogue security application called “Personal Defender 2009”.
  3. Other fraudulent methods are through email.  As an example, a very seasoned computer friend of mine recently received the following email with the subject line: “Beloved (In Good Faith)” – (click graphic below for screenshot).  You would not believe how many people fall for this type of email.

Click to Enlarge

Fraud Email - Click to Enlarge

How not to participate…

If it is something that shows up on that computer monitor screen unsolicited (that you did not ask for), be very, very skeptical…  I know our computers prompt us for updates, etc…  but, if you are not sure of what you are doing,DO NOT PARTICIPATE.  If you are skeptical about an email you received and there is instructions or pleading for you to provide information, DO NOT PARTICIPATE.  If you are solicited in any manner, where money or account information is being requested, DO NOT PARTICIPATE.

Tips from the FBI Cyber Investigations Unit

Do not respond to unsolicited (spam) e-mail.

Be skeptical of individuals representing themselves as officials soliciting via e-mail for donations.

Do not click on links contained within an unsolicited e-mail.

Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders.

To ensure contributions are received and used for intended purposes, make contributions directly to known organizations rather than relying on others to make the donation on your behalf.

Validate the legitimacy of the organization by directly accessing the recognized charity or aid organization’s website rather than following an alleged link to the site.

Attempt to verify the legitimacy of the non-profit status of the organization by using various Internet-based resources, which also may assist in confirming the actual existence of the organization.

Do not provide personal or financial information to anyone who solicits contributions: providing such information may compromise your identity and make you vulnerable to identity theft.

Where to report…

United States Processing ServiceLocal Level – I always tell people to start at their local level (i.e. State Police). Reason for this is that you can actually talk to a human being face-to-face, in a quick manner, to tell your story. If anything, psychologically, it will help.  For example, I had a friend that purchased a diamond ring on ebay for several thousand dollars and they received a “bolt”…  We contacted the State Police and believe it or not, the perpetrator was tracked down and charged; however, my friend ate the loss.

Internet Crime Complaint CenterInternet Crime Complaint Center (IC3) – Their mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime.  IC3 is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA).

United State Postal Inspection ServiceUnited States Postal Inspection Service – To file a complaint with the U.S. Postal Inspection Service if you suspect you are a victim of mail fraud.  If you have been victimized online, by fraudulent means, there may be instances where it could involve the actual mailing of money, checks, documents, etc… via “snail mail”.

Federal Trade CommissionFederal Trade Commission -   To file a complaint with the Federal Trade Commission if you suspect you are a victim of fraud.

Bottomline

When it comes to computers and the internet;

“Believe Nothing and Verify Everything”

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Coming Soon: Google Cloud Connect for Microsoft Office

November 27, 2010

Many of you may have heard of a company called DocVerse that was acquired earlier this year by Google. With this acquisition, Google had a vision, that has become a reality, where people could experience the benefits of web-based collaboration using traditional Microsoft Word, Excel and Powerpoint desktop applications. Since that acquisition, the DocVerse team has been moving the product to the Google infrastructure and has given it the name Google Cloud Connect.

Google Cloud Connect

What Google Cloud Connect has to offer is this:

  • People can continue to use the familiar Microsoft Office interface, while reaping many of the benefits of web-based collaboration that Google Docs users already enjoy.
  • Users of Office 2003, 2007 and 2010 can sync their Office documents to the Google cloud, without ever leaving Office. Once synced, documents are backed-up, given a unique URL, and can be accessed from anywhere (including mobile devices) at any time through Google Docs.
  • Once in the Google cloud, documents can be easily shared and even simultaneously edited by multiple people, from right within their Microsoft Office product.

Google Cloud Connect will be available to everyone for FREE. If you would like to be notified when it is released you can complete the Google Cloud Connect for Microsoft Office Notification Form [HERE] .

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Play Full-Featured Versions of your Favorite Solitaire Games Online for FREE

November 26, 2010

If you love playing solitaire, then I found the site for you called Just Solitaire.

Just Solitaire

The really cool part about Just Solitaire is that you do not have to install any software. Simply go to the Just Solitaire web site in your web browser and select from the 40 variations of solitaire that is available.

Just Solitaire Features:

  • More than 40 solitaire game variations to play.
  • Most games allow you to customize some rules, like the number of cards dealt from the stock and the number of times the stock is re-used.
  • Cards resize to fit your browser window.
  • Three ways to move cards: drag and drop, click to select and then again to place, double click to move to next available spot.
  • In addition to PCs and Macs, the solitaire games work on the iPhone, iPad, iPod Touch and Android devices.
  • Game state and card positions remembered when you leave and then return to the game later.
  • Choose from different decks of cards, including a set made for phones and small screens, and one optimized for older versions of Internet Explorer.
  • Choose from different solitaire backgrounds.
  • Unlimited undo moves allowing you to try different ways to win your solitaire game.
  • Two methods of scoring to accumulate points over multiple games.
  • Autoplay mode turns over cards and deals from the stock automatically.
  • Completely free to play! No signup at all!
  • StumbleIt

    jaanix post to jaanix

    Bookmark and Share

    Bookmarks4Techs_Blogger2

    [ CLICK HERE TO LEAVE A COMMENT ]


    FREE Password Management Tips and Software

    November 25, 2010

    When it comes to making up and maintaining passwords, it is astonishing how complacent we can be… Everything that we access on the internet, that is on a personal and private level, requires an account username and password, (i.e. our internet service provider account, email, banking, purchasing, instant messaging, community sites, places of employment, etc.). The majority of us will use the same username and password for every account we access and will usually use one word (for the password) that is something that we hold close to ourselves (i.e. pet’s name, child’s name, nicknames, birthday, etc.) . Instead of using good password management practices, we end up using the same password for every account we setup or maintain and often never change that password. Another fact is that we will write the password(s) down on a scrap piece of paper; then we’ll stick it on the computer monitor, under a desk pad, in a desk drawer, etc… We innocently do these things, as a matter of convenience, so that we do not forget the password. I also know for fact that we, as humans, do not like change; even something as simple as changing a password.

    What are the risks of weak password(s) falling into the wrong hands?

    A person can access our accounts to impersonate us; steal our identity; monitor our activities; acquire personal information; sign our name to online service agreements and contracts; change our account information or profile, acquire credit card information, etc.  To put this into perspective, it is not uncommon for online web mail accounts (passwords) to be hijacked and you the victim become locked out the account.  You probably thinking, so what, my email account carries no value. Well it will when everyone in your address book starts receiving scam emails indicating that you are stranded in a foreign country and you need money; plus, you put each of those addresses, in your address book, at risk.

    What to do (some basic password management tips):

    • When possible, use a “Passphrase” instead of a “Password”. “Passphrases” are nonsensical sentences that are easily remembered. For example; by typing “My wife calls me donkey! Wonder why?” is harder to crack than using the password “donkey”; however, the problem we run into is that many services do not allot enough character space to type a full sentence or phrase. If you have to use a “Password”, use at least 7 characters, make it easy to remember, avoid dictionary words, avoid number sequences, and throw in an upper/lower case mix with some symbols (for example: Eye812!).  The longer the password, the better.

    You can test the strength of your passwords at Test Your Pas$word.

    test-your-password

    • Use good password management practices when protecting accounts that are very important.
    • Do not share your passwords with anyone. Treat passwords as if they are the keys to your house.
    • Do not use passwords that would be common to your profile as a person (i.e. birth date, dog’s or cat’s name, nickname)
    • Do not use passwords such as Admin, Administrator, 12345, password, etc…
    • Change the Password or PassPhrase on a regular basis. We have the tendency to not change our passwords for years.
    • Use Password Management software such as KeePass or S10 Password Vault to manage, store and automate username and password form entries.

    If you have any other password management tips you would like to share with the readers here, please comment below.

    StumbleIt

    jaanix post to jaanix

    Bookmark and Share

    Bookmarks4Techs_Blogger2

    [ CLICK HERE TO LEAVE A COMMENT ]

     


    Geek Squeaks’ of the Week (#87)

    November 24, 2010

    It’s Wednesday again and time for Geek Squeaks’. Here you will find the latest articles, as authored, by those you are associated with the What’s On My PC blogroll. Top notch tech articles, by top notch tech people!

    Geek Squeaks'

    Malware Removal Instructions
    How to remove Scan Disk (Uninstall Instructions)

    Online Storage Reviews
    How to Select an Online Storage Package

    AKSGEEK Live
    Apple’s Find My iPhone/iPad/iPod touch Feature now Free

    PC Optimization Secrets
    How To Backup Windows 7 Using System Images

    Chicago Mac/PC Support
    iPads now helping food charity feed the hungry

    Netbook Freeware
    PhotoJoy: Turn Photos Into Amazing 3D Screensavers,
    Collages, Desktop Wallpaper and Photo Widgets

    I Love Free Software
    BExplorer: Add Tabs to Windows Explorer

    Worthy Tips
    Chit Chat for Facebook – A Powerful Chat Client for Facebook

    404 Tech Support
    I Called It – Netflix Announces Price Increase and Offers New Streaming-Only Plan

    I Want Ice Water
    Dream On

    TTC Shelbyville
    Security hole in Google?

    Carputers News and Computer Tips
    More GMail Tips and Tricks

    Snakebytez
    Registry Life : Advanced Registry Cleaner and Optimizer for Windows

    My Technology Guide
    Process Lasso 4 Free: Optimize Windows Process Priority For Stability

    Awesome Wallpapers
    Windows Se7en Wallpaper Set

    Bookmarks4Techs
    Featured Site – Windows News

    Canadian Tech Blogger
    New Windows 7+Windows Live Ad Leaves You Thinking

    Mrintech
    Doodle 4 Google India 2010 Winner: Akshay Raj

    thePC Security
    Safeguard Files, Folders on Computers –
    Password Protection Freeware Review

    Bill Mullins’ Weblog – Tech Thoughts
    Cyber Shopping on Black Friday?
    Six Tips From PandaLabs To Keep You Safe

    Confessions of a Freeware Junkie
    Archive your GMail, Live, Yahoo! or other eMail: MailStore Home 4

    Plato On-Line
    Skip Pat-Downs by Opting for Strip-Down

    RGdot
    kuView: The Lightweight Image Viewer

    Laptop Reviews Central
    PeeWee Debuts New Laptop for Kids

    Paul’s Home Computing Blog
    Internet Security: The Crimeware Explosion

    Technogran’s Tittle Tattle
    Windows Live Essentials 2011. Windows Live Writer

    TuneUp Blog about Windows
    Fully Automate Your PC with Task Scheduler (Part 1 of 2)

    Lifehacker
    The Most Helpful Ways to Use Google Voice that You’re Not Using

    Rarst.net
    iWisoft Free Video Converter

    Tech-for Everyone
    How To Out-savvy Your Child

    AskBillFirst
    Shopping Online Safely

    Gadgetsholic
    Sony Ericsson Anzu 4.3 inch tablet

    Faster PC! Clean! Clean!
    How to Remove XP Guard

    What’s On My PC
    Speed Up Your Internet Connection: 8 DIY Tips

    StumbleIt

    jaanix post to jaanix

    Bookmark and Share

    Bookmarks4Techs_Blogger2

    [ CLICK HERE TO LEAVE A COMMENT ]


    Follow

    Get every new post delivered to your Inbox.

    Join 291 other followers

    %d bloggers like this: